Apache Chainsaw up to 2.0.x deserialization [CVE-2020-9493]

A vulnerability, which was classified as critical, has been found in Apache Chainsaw up to 2.0.x. Affected by this issue is an unknown code. Upgrading to version 2.1.0 eliminates this vulnerability.

Description:

A de-serialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.

Mitigation:

Don’t configure Chainsaw to read serialized log events. Use a different receiver, such as XMLSocketReceiver

Apache Chainsaw

Chainsaw is a Java-based graphical user interface software tool to view and analyze log files. It enables users to analyze logs specifically generated by the Log4j logging system. Chainsaw v2 is a companion application to Log4j and the latest release is Chainsaw v2. Chainsaw and Log4j are Open source projects under Apache Software Foundation. 

Chainsaw can be used where it relies on a combination equivalent to view/query/trace via a large trail of logging events. Chainsaw can read local and ssh-reachable regular text log files, as well as log files formatted in Log4j’s XMLLayout. Chainsaw can receive events over UDP and TCP, read events from a database, and can also process events generated by java.util.logging.

Some features of Chainsaw v2:

  1. View remote events 
  2. Saved Preferences
  3. Responsive 
  4. Tabs/Docking 
  5. Coloring  
  6. Dynamic and powerful filtering 
  7. Cyclic (can support a Cyclic-based model and is great for monitoring live applications)
  8. Built-in documentation and tutorial 

 

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2024-20418 : CISCO IOS XE CONTROLLER WEB-BASED MANAGEMENT INTERFACE COMMAND INJECTION

CVE-2024-20418 : CISCO IOS XE CONTROLLER WEB-BASED MANAGEMENT INTERFACE COMMAND INJECTION

Description A vulnerability in the web-based management interface of Cisco Unified Industrial Wireless Software for Cisco Ultra-Reliable Wireless Backhaul (URWB)

CVE-2024-20536 : CISCO DATA CENTER NETWORK MANAGER 12.1.2E/12.1.2P/12.1.3B WEB-BASED MANAGEMENT INTERFACE/REST API ENDPOINT SQL INJECTION

CVE-2024-20536 : CISCO DATA CENTER NETWORK MANAGER 12.1.2E/12.1.2P/12.1.3B WEB-BASED MANAGEMENT INTERFACE/REST API ENDPOINT SQL INJECTION

Description A vulnerability in a REST API endpoint and web-based management interface of Cisco Nexus Dashboard Fabric Controller (NDFC) could

CVE-2024-50340 : SYMFONY INJECTION

CVE-2024-50340 : SYMFONY INJECTION

Description symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the